adplus-dvertising
frame-decoration

Question

If the first update is overwritten by a second, it is called as a _______ update

a.

Useful

b.

Overlapping

c.

Lost

d.

Concurrent

Posted under DBMS

Answer: (c).Lost

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. If the first update is overwritten by a second, it is called as a _______ update

Similar Questions

Discover Related MCQs

Q. State true or false: Snapshot isolation prevents lost updates

Q. Which of the following is a variant of snapshot isolation

Q. Under ________ the system uses locking mechanism that applies only to updates

Q. The situation in which each pair of transactions has read a data written by the other, but there is no data written by the transactions is called as _______

Q. Oracle uses __________ for the serializable isolation level

Q. State true or false: Snapshot isolation has low overhead

Q. In ________ no two aborts occur unless two concurrent transactions update the same data item.

Q. Which of the following transactions can multiversion two phase locking protocol not differentiate.

Q. ________ deletes a data item from a database

Q. Which of the following does not lock the entire index

Q. Which of the following is included in the operational mechanism of the index locking protocol?

Q. _________ is a form of two degree consistency designed for programs that iterate over tuples of a relation by using cursors.

Q. Transactions that involve user interactions are called __________

Q. State true or false: Key value locking provides increased concurrency

Q. To prevent the phantom phenomenon, _______ is used

Q. Which of the following does cursor stability ensure

Q. State true or false: Exclusive locks are held until transaction commit in degree two consistency

Q. In order to maintain transactional integrity and database consistency, what technology does a DBMS deploy?

Q. Which of the following are introduced to reduce the overheads caused by the log-based recovery?

Q. Which of the following protocols ensures conflict serializability and safety from deadlocks?